Sciweavers

218 search results - page 40 / 44
» A simulation study of the OSPF-OMP routing algorithm
Sort
View
CCS
2007
ACM
15 years 5 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
IWCMC
2006
ACM
15 years 5 months ago
Priority-based receiver-side relay election in wireless ad hoc sensor networks
Receiver-side relay election has been recently proposed as an alternative to transmitter-side relay selection in wireless ad hoc networks. In this paper we study different priori...
Komlan Egoh, Swades De
ICPP
2000
IEEE
15 years 4 months ago
Domination and Its Applications in Ad Hoc Wireless Networks with Unidirectional Links
We consider an efficient distributed algorithm for determining a dominating and absorbant set of vertices (mobile hosts) in a given directed graph that represents an ad hoc wirel...
Jie Wu, Hailan Li
COMCOM
2006
117views more  COMCOM 2006»
14 years 11 months ago
End-to-end quality of service provisioning through inter-provider traffic engineering
This paper addresses the issue of delivering solutions that will enable the incremental implementation of inter-domain quality of service (QoS) in the multi-provider commercial In...
Michael P. Howarth, Mohamed Boucadair, Paris Flegk...
JPDC
2006
187views more  JPDC 2006»
14 years 11 months ago
Maximum lifetime data sensing and extraction in energy constrained networked sensor systems
We focus on data gathering problems in energy constrained networked sensor systems. The system operates in rounds where a subset of the sensors generate a certain number of data p...
Bo Hong, Viktor K. Prasanna